Thunderstrike 2 firmware worm proves Apple needs to introduce a bug bounty

Thunderstrike 2 firmware worm proves Apple needs to introduce a bug bounty

Another serious vulnerability has been found at the heart of Macs and MacBooks, and could be exploited by an undetectable firmware worm.

Shouldn't Apple be doing more to encourage vulnerability research?

Read more in my article on the Intego Mac Security blog.

Tags: , , , , ,


Read more...
Windows 10 uses your bandwidth to help strangers download updates

Windows 10 uses your bandwidth to help strangers download updates

Have you updated your computer to Windows 10 yet?

If so, one hopes you're aware of one of its less well-known features - that could mean that your internet bandwidth and data plan is being used to help complete strangers download their updates.

Tags: , , , , ,


Read more...
Get trending info on hackers, exploits, and vulnerabilities every day for FREE with the Recorded Future Cyber Daily [Sponsor]

Get threat intelligence on hackers, exploits, and vulnerabilities for FREE with the Recorded Future Cyber Daily [Sponsor]

Many thanks to the great folks at Recorded Future, who have sponsored my writing for the last week, and for the next few weeks.

Recorded Future provides deep, detailed insight into emerging threats by automatically collecting, analyzing, and organizing billions of data points from the Web.

And now, with its FREE Cyber Daily email all IT security professionals can access information about the top trending threat indicators - helping you use threat intelligence to help make better decisions quickly and easily.

(more…)


Read more...